GPS Jammers - Vulnerabilities and Spoofing of Satellite Navigation and Timing Systems

Live Webinar

   Wednesday, September 13, 2017

 8:00 AM PDT | 11:00 AM EDT | 3:00 PM GMT

Duration: 45 minutes followed by live 15-minute Q&A

 

Registration closes in:

DaysHoursMinutesSeconds
 

In today’s data-driven world, receivers and sensors along with historical data have been used to hunt down willful and intentional GPS jamming by people wishing to evade tolls, trucking companies, employees wanting to evade employer surveillance as well as sophisticated jamming patterns and spoofing that would require a highly-sophisticated adversary and gear that is not available to the average citizen.

This webinar gives a brief introduction into the vulnerabilities of satellite navigation and timing systems and the ways in which these vulnerabilities can be exploited. The specific vulnerabilities of GPS-based systems are introduced – the main vulnerabilities of GPS are due to the very low signal strength of the satellite signals. The webinar also discusses the effect of Radio Frequency (RF) interference on satellite navigation and timing systems and uses some real examples of disruption caused by real-interference events. The webinar also highlights that spoofing can be carried out either at the application layer (using PokemonGO as an example to demonstrate this) or at the RF level – where different examples are used to demonstrate this.


GPS Jammers - Vulnerabilities and Spoofing of Satellite Navigation and Timing Systems

About this Webinar:

  • Real examples of GPS jamming attacks (deliberate and even accidental)
  • Real examples of GPS spoofing – At application layer, Pokemon GO game,
  • Automatic Identification Service (AIS)
  • At RF level – DEFCON examples/demos and the attempted spoofing of drones


This webinar will discuss the wide variety of exploitations of RF interference used by several groups of attackers with various motives – often these groups attempting to exploit navigation and timing system vulnerabilities are the same types who have exploited IT systems. Approaches to mitigate systems and devices against the described vulnerabilities are showcased along with a protective risk assessment and test framework that can make significant improvements to existing systems.


Date: Wednesday, September 13, 2017

Time: 8:00 AM PDT | 11:00 AM EDT | 3:00 PM GMT

Duration: 45 minutes followed by live 15-minute Q&A


If you have any questions about content discussed in the webinar or about how Spirent Security Solutions can help your security arsenal, do not hesitate to contact us or visit our Security Solutions page for more information.

Register Today


To our customers: We'll never sell, distribute or reveal your email address to anyone. Privacy Policy

Vladislav Gostomelsky

Spirent Federal, Managing Consultant

Spirent

Domain expertise: Automotive, Web application testing, Network penetration testing, Wireless, Embedded, Social Engineering, IOT, SCADA, Reverse Engineering, Red Team, Lock Picking

Vlad is a driven security researcher with a passion for securing technology that makes civilized life possible. He is particularly focused on automotive security, satellite systems security, SCADA systems supporting the critical infrastructure and wireless networks. He specializes in the intersection of physical and network security. He has worked on DARPA projects, established and lead penetration testing teams for Fortune 50 organizations, performed incident response and forensics on sensitive production systems within controlled environments, reverse engineered security devices, and participated in countless red team engagements for banks, critical infrastructure, pharmaceutical companies, law firms and research organizations. Vlad has spoken at various security conferences including Bsides, DEFCON, HOPE, and ShmooCon. Vlad was a board member for NYC OWASP and remains committed to the security community working together to improve the security posture through developer education, end user training, peer- reviewed code and rigorous standardized testing methodologies.